Computerworld-U.S.officials today struck at six long-running scams,freezing assets of 14 companies charged with bilking consumers by posing as tech support from Microsoft,Symantec and others. In a press conference,the Federal Trade ...
Tags: U.S.officials, FTC, tech support
Infoworld-Network and endpoint security may not strike you as the first place to scratch an experimental itch.After all,protecting the company's systems and data should call into question any action that may introduce risk.But IT security ...
Tags: crazy IT security tricks
Computerworld - An elite hacker group targeting defense industry sub-contractors has an inexhaustible supply of zero-days, or vulnerabilities that have yet to be publicized, much less patched, Symantec said today. In a blog post, the ...
Tags: Elite hacker gang, zero day bugs, Google, hackers, zero day
Network World - Trying to get computer forensics data out of mobile smartphones and tablets in order to conduct investigations is hard -- often much harder than on PCs, laptops or Macs -- and experts say that forensics tools need to ...
Tags: smartphones, tablets, mobile smartphones, laptops, PCs
SAN FRANCISCO, CA, June 13, 2012 /24-7PressRelease/ -- OPSWAT announced that their free security application removal tool, AppRemover, has been downloaded over one million times. Available at http://appremover.com, the tool enables easy and ...
Tags: AppRemover, security applications, McAfee, Symantec, OPSWAT
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher. A limited ...
Tags: Attackers, emails, private data, Yahoo users
Symantec had spotted another odd piece of malware that appears to be targeting Iran and is designed to meddle with SQL databases. The company discovered the malware, called W32.Narilam, on Nov. 15 but on Friday published a more detailed ...
Tags: Symantec, odd piece, malware, SQL databases
French security firm Intego discovered a new Mac Trojan horse this week that is being used to target specific individuals. The Trojan, dubbed "Crisis" by Intego -- a Mac-only antivirus developer -- and called "Morcut" by Sophos, is ...
Tags: Intego, Mac, Trojan horse, Hacking Toolkit
A new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement agencies is using localized voice messages to trick victims into paying made-up fines, ...
Tags: Reveton, victims, computers, displays, antivirus vendor, Trend Micro
Spammers have found a way to abuse a URL shortener service destined for U.S. government social media activities in order to craft rogue .gov URLs for work-at-home scams. Security researchers from Symantec have detected a new email spam ...
Tags: Spammers, URL shortener service, U.S.government, social media activities
Advanced analysis of the Morcut Mac OS X malware that targets computers running Apple’s Mac operating system (OS) or Microsoft’s Windows OS has revealed that it also targets virtual machines and Windows mobiles. The malware, ...
Tags: Morcut Malware, Virtual Machines, Symantec, Computer Products
Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
Computerworld - Symantec Tuesday announced the latest version of its Veritas Cluster Server (VCS), which adds the ability to reduce virtual machine recovery times by using VMware's vMotion data migration capabilities. The new version of ...
Tags: Symantec, Veritas Cluster Server, virtual machine, VMware's vMotion
Hoping to raise awareness about the importance of keeping software up to date, several major software companies, including Microsoft and Symantec, participated in an initiative called International Technology Upgrade Week earlier this ...
Tags: software, software companies, Microsoft, Symantec
IDG News Service - Cybercriminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. ...
Tags: Cybercriminals, computer, malware, commercial proxy service